+ All Categories
Home > Documents > Container Security: Combating the Rip-On Rip-Off technique ...

Container Security: Combating the Rip-On Rip-Off technique ...

Date post: 08-Dec-2021
Category:
Author: others
View: 1 times
Download: 0 times
Share this document with a friend
Embed Size (px)
of 31 /31
Container Security: Combating the Rip-On Rip-Off technique and the Blockchain Technology By Elena-Sofia Cesario
Transcript
Container Security: Combating the Rip-On Rip-Off technique and the Blockchain Technology
By Elena-Sofia Cesario
Author: Elena-Sofia Cesario
Editors: Harshita Bhattacharya, Avani Bohara, Ajatshatru Bhattacharya
© INVICTUS CORPORATION LTD. and the author 2021
No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by
any means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without
written permission from the Publisher, with the exception of any material supplied specifically for the
purpose of being entered and executed on a computer system, for exclusive use by the purchaser of
the work. The use of general descriptive names, registered names, trademarks, service marks, etc. in
this publication does not imply, even in the absence of a specific statement, that such names are
exempt from the relevant protective laws and regulations and therefore free for general use.
Produced, published and distributed by INVICTUS CORPORATION LTD., The Hague, The Netherlands
Website: https://invictuscorp.org/
The registered company address is: New World Campus, Spaarneplein 2, 2515 VK The Hague, The
3.1. Container Security ....................................................................................................................... 7
3.1.1. OCGs Piggybacking .............................................................................................................. 9
3.2. Container Seal ........................................................................................................................... 13
3.4. Container Tracking .................................................................................................................... 19
4.1. Corruption at seaports ............................................................................................................. 22
4.2. Blockchain Solutions ................................................................................................................ 23
6.4. Secondary Sources ................................................................................................................... 29
Keywords: Container, Seal, Security, Rip-Off, Rip-On, Corruption, Blockchain, Maritime, Shipping, Seaports
Container Seal Security | 4
CCP Container Control Program
CTU Cargo Transport Unit
EMCDDA European Monitoring Centre for Drugs and Drug Addiction
EU European Union
GPS Global Positioning System
H Seal High-Security Seal
ILO International Labour Organization
IMO International Maritime Organization
IoT Internet of Things
ISM International Safety Management
ISPS International Ship and Port Facility Security
OCGs Organised Crime Groups
SAFE Framework Standards to Secure and Facilitate Global Trade Framework
SOLAS Safety of Life at Sea
TEU Twenty Equivalent Unit
UNECE United Nations Economic Commission for Europe
UNODC United Nations Office on Drugs and Crime
VGM Verified Gross Mass
WCO World Customs Organization
WCO World Customs Organization
Container Seal Security | 5
1. Introduction
Due to the complex nature of international supply chains, it is no surprise that at any given time, there
are numerous parties involved in the trade process. Each party has a unique role and a different set
of responsibilities and liabilities, making for an intricate operational framework. This complexity and
intricacy allow nefarious Organised Crime Groups (OCGs) to infiltrate the supply chain, elude security
and ‘piggyback’ off legitimate trade routes.
Container screening involves just 0.0005% of the overall containers arriving in seaports. Given the
significant volumes, it is often challenging for authorities to notice if a container has been tampered
with during its journey. Considering this low screening rate, one of the most commonly utilised modus
operandi by the OCGs to benefit from legitimate trade and smuggle contraband is the ‘Rip-On/Rip-
Off’ technique. In conjunction with corruption at seaports, this technique enables OGCs to use
seaports such as the Port of Rotterdam to smuggle contraband into Europe.
In the recent decade, we have observed a sharp increase in the volume of international maritime
trade. Many experts argue that traditional paper-based systems are inefficient and vulnerable to
exploitation by the OCGs. For instance, the documents and container seals are susceptible to forgery,
and it is often hard to allocate individual liability given the numerous parties involved. Various
stakeholders involved in the process have identified container traceability, container seal security,
and an increasing rate of corruption amongst port workers as the most prominent challenges in the
current framework.
This report aims to provide a comprehensive overview of the ‘Rip-On/Rip-Off’ technique and how
stakeholders could address the associated challenges. The report also highlights emerging
technologies such as blockchain and its use within the traditional international maritime trade
framework. Finally, the report addresses the importance of container seals in the trade process while
highlighting the need for a more automatised operational framework.
Container Seal Security | 6
Data surrounding the Rip-On/Rip-Off technique must be considered through the lenses that 0.0005%
of containers are screened worldwide in seaports. Given the nature and importance of container
security and seaport security, Organized Crime Groups exploit this lack of infrastructure and capacity
for their nefarious schemes.
In order to address the subject matter efficiently and effectively, the report relies on a mixed research
methodology. More specifically, this report utilises doctrinal and empirical research methodologies.
Doctrinal research allows for an evaluation of the international framework relating to container
security and its interaction with blockchain technology. An empirical research methodology is
subsequently utilised to gain practical insights and verify the findings.
Chapter 3 provides a doctrinal analysis of the current challenges that seaport security faces regarding
OCG’s illegal business in seaports, including its primary modus operandi, the Rip-On/Rip-Off
technology. Furthermore, it considers several salient points on the Rip-on/Rip-Off at seaports and its
role in undermining container security to provide a comprehensive summary of the modus operandi
process.
Building on this, Chapter 3.2. provides a description of container seals and their usage within the
transnational framework. The section further outlines the goals, practical frameworks, methods for a
tamper-proof system by the International Organization for Standardization, and the different types of
container seals in the market and their identification code. Following this, the report illustrates various
challenges associated with container tracking and how stakeholders are looking to provide a suitable
tracking device within the container.
Chapter 4 takes a turn towards empirical legal research, considering corruption cases at the Port of
Rotterdam in a time frame from 2010 until 2019. It will primarily employ a qualitative empirical
approach, conducting document analysis and case analysis to access the Rip-On/Rip-Off technique’s
role in bribing seaport workers for its success.
A combined approach of qualitative and doctrinal research is the most suitable to answer the relevant
research question through a doctrinal analysis of container seals’ role, empirical considerations of its
effectiveness in making a tamper-proof container. The methodology effectively caters to defining the
container seals’ useful function and outlining the challenges posed by technological innovation.
Moreover, the present research focuses on the goals, approaches, and new blockchain technology
methods.
As technological developments pose novel legal challenges to the international community, it does
help the maritime security field to tackle long-overdue illegal practices at seaports. Furthermore,
within the automatisation of seaports, such unlawful practices could drastically diminish; however,
since it is a new technology under development, research on such topics must be continuously
revisited. This report ultimately aims to contribute to such literature.
3. The Rip-on/Rip-off technique
3.1. Container Security
World seaborne trade has seen a steady increase since 19801; breaking in 2017 a threshold of 10.000
million tons.2 More specifically, regarding global containerised trade, the UNCTAD estimates that
752.2 million of 20 foot-equivalent units (TEUs) were moved through ports worldwide in 2017. In
2018, seaports handled nearly 80% of the global trade of goods in terms of volume.3 Authorities across
the globe, such as but not limited to the International Maritime Organization (IMO) have long
acknowledged the security challenges associated with this volume.
Graph 1: All Cargo (Crude oil, petroleum products and gas; main bulks; other dry cargo).4
In parallel with global container trade growth, criminal organisations are expanding their cross-border
operations and finding innovative ways to circumvent security measures. From a microeconomic
perspective, the motivation behind OCGs growth can be found in the increased (international)
demand for illicit goods and the proliferation of ‘retailers’ and traders on the dark web. In addition to
1 United Nations Conference on Trade and Development, ‘Review on Maritime Transport 2018’, 2018. 2 Ibid. 3 Ibid. 4 United Nations Conference on Trade and Development, based on data supplied by reporting countries and as published on government and port industry websites, and by specialist sources. Notes: Dry cargo data for 2006 onwards were revised and updated to reflect improved reporting, including more recent figures and a better breakdown by cargo type. Since 2006, the breakdown of dry cargo into main bulks and dry cargo other than main bulks is based on various issues of the Shipping Review and Outlook, produced by Clarksons Research. Total estimates of seaborne trade figures for 2017 are based on preliminary data or on the last year for which data were available.
0
2000
4000
6000
8000
10000
12000
1970 1980 1990 2000 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017
Container Seal Security | 8
this growth in demand and ease of access, OCGs are also benefitting from globalisation and an
increase in the global trade volume. Furthermore, considering the sheer volume of international
maritime trade, it should come with no surprise that the OCGs would look to capitalise on existing
legitimate transnational maritime trade routes for their nefarious schemes. For instance, the
European Union (EU) handles around 11 million containers each year, of which barely 50.000 are
adequately scanned which presents a unique low-risk cost-effective opportunity to OCGs.5
Graph 2: Gross weight (tonnes per inhabitant) of seaborne freight handled in all seaports (2018).6
To put things in perspective, these numbers
indicate that mere 0.0005% of containers that
arrive at European seaports are scanned. On
the one hand, the large volume of legitimate
goods makes it easier for OCGs to conceal
contraband and minimise detection risk. On
the other, this operational framework is highly
cost-effective compared to other frameworks
such as air transport for transnational
smuggling. In a 2016 report, the European
Monitoring Centre for Drugs and Drug
Addiction (EMCDDA) visualised air, land, and
maritime drug trafficking routes between
Latin America – Europe and Africa as utilised
by various OCGs.7
5 Ibid; United Nations Conference on Trade and Development, ‘Review on Maritime Transport 2018’, 2018. 6 EuroStat, ‘Gross weight of seaborne freight handled in all ports’, 2018, accessed September 1, 2020. 7 European Monitoring Center for Drugs and Drug Addiction, ‘Interactive map of cocaine trafficking routes to Europe’
<https://www.emcdda.europa.eu/cocaine-trafficking-europe_en> accessed September 1, 2020.
Alongside various stakeholders, the international community has taken legislative and policy-driven
measures to contain the growing transnational illicit trade and address emerging security
vulnerabilities. For instance, the International Convention for the Safety of Life at Sea (SOLAS) was
amended, and new chapters - namely Chapter IX: International Safety Management (ISM) Code and
Chapter XI-2: The International Ship and Port Facility Security (ISPS) Code - were introduced to address
some of the concerns mentioned above. Recognising that the seaports and stakeholders in the
maritime supply chain process are migrating towards digitalisation, the IMO in 2017 published
guidelines on Maritime Cyber Risk Management to safeguard shipping from current and emerging
threats and vulnerabilities related to digitisation, integration and automation of processes and
systems in shipping. More recently, in 2020, the IMO has further developed on these guidelines and
published a comprehensive report on, ‘Safe Transport of Containers’, where it not only acknowledges
emerging practices of OCGs but has also developed a series of requirements to ensure safe shipping
as well as guidance for packing and securing containers.8
3.1.1. OCGs Piggybacking
While efforts towards a more secure environment have been made, a uniform approach to container
security at seaports globally might still be far away. Based on data aggregated by EMCDDA and
Europol in their 2019 EU Drug Market Reports it is evident that the demand for illicit goods (more
specifically narcotics) has seen a sharp uptrend and that the OCGs can meet the demand.9 However,
due to the complexity of the maritime supply chain and secretive nature of OCGs activities, it is hard
to gauge the direct effect of these legislative efforts on the growth of the illicit markets or the
associated security challenges.
As eluded above, OCGs prefer to infiltrate maritime trade routes due to the lower risk of detection
and cost-effective concealment as well as transportation of contraband. OCGs look for existing
maritime trade routes that lead them to their target seaport and aim to conceal their contraband
alongside legitimate goods. This operational framework is often referred to as a ‘piggyback ride’. Over
the last decade, the OCGs have developed and refined various modus operandi and techniques within
this operational framework. These include ‘Rip-on/Rip-off’, switching (containers), concealing
contraband inside the container structure, drop-off, underwater attachments and semi-submersible
attachments.10 Some of these illegal actions are perpetrated by exploiting the means through which
6 IMO, ‘Safe Transport of Containers’, accessed August 15, 2020. <http://www.imo.org/en/MediaCentre/HotTopics/container/Pages/default.aspx>. 9 European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) and Europol, ‘EU Drug Markets Report 2019’ (2019)
Publications Office of the European Union. 10 Ajatshatru Bhattacharya and Benjamin Peters, ‘The Underwater War on Drugs: An overview of the Dutch Customs Diving Team’, 2020, Invictus Corporation Ltd.
Container Seal Security | 10
containers are tracked and secured.11 For instance, every container has a bill of lading, which states a
very detailed list of its cargo; to avoid tampering during the shipment, containers are equipped with
seals. It is essential to underline that these seals are no longer produced by government-run
companies but by private companies.
Additionally, due to the complex multi-stakeholder operational framework, OCGs require assistance
from seaport personnel to place and recover their illegal goods. To that end, the OCGs have also been
exploiting the personnel increase needed to handle the increased trade at seaports by promoting
corruption through extortion, coercion, bribery and other means.
3.1.2. The Rip-On/Rip-Off Technique
In the past years, ‘Rip-On’ has emerged as the most used technique to traffic illegal goods. The World
Customs Organization (WCO) in 2008 defined this technique as selecting a container with a predefined
route and legit cargo. With seaports workers’ help, OCGs can place their illegal goods inside the
container before the seal is applied at the port of departure. Then they will recover the content at the
port of arrival and eventually use a fake seal to avoid clear signs of container tampering. A vital
element of this modus operandi is the corruption of port employees at both ends.12
Procedurally, the OCGs identify a container destined for target location, say for instance Europe. Once
it is selected, the OCGs carry out an assessment on its suitability – amongst other aspects, they look
at the relevant procedures applicable to the container, the travel time, storage conditions. Once
finalised, OCG Members or their associates (corrupt port workers) conceal the contraband in the
container(s). Once it reaches Europe, there are two prerequisites for the success of their scheme.
First, the OCG Members or their associates must have all the relevant container information such as
but not limited to the location of the container, details for the container seal (in the event of ‘re-
locking’, more on this below), relevant schedules. Second, the individuals in question also require
‘easy’ access to the container terminal.
In the event, the collection must take place at a transit location, or while the container is still on its
journey, OCGs or their associates share information on the original container seal used is provided to
the Rip-Off team which then makes a duplicate seal with the same specifications such as the same
serial numbers or identifiers. During the retrieval process, the original seal is broken, and contraband
is retrieved after which the container is sealed with the duplicate seal to avoid any signs of tampering.
An interesting peculiarity of this modus operandi is that, sometimes, when the container seal
11 Ibid.. 12 EUROPOL, ‘EU Drug Markets Report – a Strategic Analysis’, 2019 page 62.
Container Seal Security | 11
information is available in advance, the loading team places the duplicate seal within the illicit cargo,
to enable the counterpart at the seaport of arrival to reseal as necessary.
Image 2: An overview of the Rip-On/Rip-Off modus operandi.13
Since the contraband has to be collected physically from the container, it is quintessential for the
container to be either in a secluded region or an area with less supervision i.e. a low risk zone. One
could argue that the entire operation revolves around having access to strategic port areas at both
the port of departure and arrival. Furthermore, since a piggyback framework requires legitimate cargo
to be present alongside contraband, it is often the case that neither the consignee nor the shipper is
aware of the tampering or the contraband placed within the container(s).14 It is perhaps interesting
to note that OCGs often target containers with perishables (for example fruits and vegetables) since
they follow accelerated customs procedures and are often fast-tracked for other procedures. At the
13 H.J.M. Staring, L.C.J. Bisschop, R.A. Roks, E.G. Brein and H.G. van de Bunt, ‘Drug Crime in the Port of Rotterdam: about the phenomenon and its approach’, 2019 page 23. 14 United Nations Office On Drugs and Crime, ‘CCP Glossary of Terms’. <https://www.unodc.org/ropan/en/BorderControl/container-control/ccp-glossary-of-terms.html>, accessed August 25 2020.
Container Seal Security | 12
time of writing this report, findings suggest that this modus operandi is primarily used to smuggle
cocaine and cannabis.15 It is estimated that 3.6 million adults (between 15-64) in Europe used cocaine
in 2019 alone.16 Building up from the European Monitoring Centre for Drugs and Drug Addiction, after
cannabis, it is the second most seized drug.17
Analysing the corruption requirement further, it becomes evident that OCGs have become extremely
persuasive in order to corrupt workers and law enforcement officers. It also includes violent methods,
such as threats to the target, and his/her family, for instance, showing them a picture of their
children18. An increase in these actions has been seen mostly in Spain, Belgium, and the Netherlands.
Regarding the Port of Rotterdam, in the Netherlands, it has been registered that corruption cases
have sparked between 2003 and 2010.
Graph 3: Corruption and fraud investigations at Port of Rotterdam.19
Evidence shows that OCGs involved in trafficking cocaine are incredibly violent groups, but how do
they corrupt, and why port employees participate in rip-off operations? Based on real-life justification,
it needs to be considered that these justifications were made “after-the-fact rationalisations rather
than before-the-fact neutralisations”.20 With this said, some of them referred to their previous history
of gambling and drug abuse to highlight their precarious financial situation. Furthermore, others
argued that they took part in living up to their family expectations, the fear of losing their families
because they could not provide what they needed financially. Lastly, some of them became corrupt
because they were “seduced” by way of life their colleagues were carrying by playing a role in the Rip-
15 EMCDDA (n. 8), page 141. 16 European Monitoring Centre for Drugs and Drug Addiction, ‘Perspectives on Drugs, Cocaine Trafficking to Europe’, Updated 31.5.2016, page 2. 17 Ibid. 18 Yarin Eski, Romano Buijt, ‘Dockers in Drugs: Policing the Illegal Drug Trade and Port Employee Corruption in the Port of Rotterdam’, 2019, page 373. 19 Ibid; page 374-375. 20 Ibid; page 207-208.
Container Seal Security | 13
Off, the so-called “quick fix riches.” These people who got involved in this modus operandi saw a
possible way out of an inconvenient financial situation.21
The Rip-On/Rip-Off method has seen in the past years an increase in its use. However, nowadays, this
method is less and less preferred because of the continuous robotisation of terminals; which does not
give much space for OCGs to infiltrate. On the other hand, the excessive robotisation and regulation
of just specific terminals might cause the water-bed effect, regulating more the security of a single
port would mean that OCGs instead of shipping to that specific port would move their interests onto
another, this would probably cause another port to be part of more Rip-on/Rip-off routes.22 For this
reason, it is crucial that steps towards automatisation are regulations are made as an overall
cooperative action. Otherwise, they would become ineffective at a certain level.
Interestingly, contrary to the trend illustrated in Graph 3, Port of Rotterdam’s efforts towards
automation, digitisation, and digitalisation through projects such as PORTHOS, would result in fewer
cases of corruption due to reduced workforce and dependence on autonomous vehicles for transport
but may result in a significantly higher number of cyberattacks.
3.2. Container Seal
Container seal plays an important role when it comes to container security. Indeed, the global
definition of container security stands within these words of the International Container Standard
Organization (ICSO) which states that a container can be considered safe and secure when the cargo
manifest matches the content of the container, which need to satisfy the requirements of the integrity
of the container itself and the seal without any presence of third-party damage.23
This definition elucidates different aspects of container security. One of the aspects addressed in this
report is the container seal’s role in the maritime supply chain. The latter is paramount to determine
if there has been a breach of container security.24
In 2014, IMO, the International Labour Organization (ILO) and the United Nations Economic
Commission for Europe (UNECE) published the Code of Practice for Packing of Cargo Transport Unit in
order to create a general code able to cover related container-issues. The document outlines every
21 Yarin Eski, Romano Buijt, ‘Dockers in Drugs: Policing the Illegal Drug Trade and Port Employee Corruption in the Port of Rotterdam’, 2019, page 382-383. 22 Frank Boerman Martin Grapendaal Fred Nieuwenhuis Ewout Stoffers, ‘National Threat Assessment: Organized Crime’, 2017, page 36-39. 23 World shipping Council’s definition, 2006; and Girish Gujar, Adolf K.Y. Ng, Zaili Yang ‘Contemporary Container Security’, 2018, page 10. 24 Ibid; page 10.
Container Seal Security | 14
aspect regarding the loading and closing of the container.25 Analysing more deeply the previously
mentioned code, chapter 11 “On completion of packing” comma 1 “Closing the Cargo Transport Unit
(CTU)” shows the process of closing a shipping container.26 Starting from the cargo packing of the CTU,
once completed, the packer “should ensure that all closures are adequately engaged and secured”.27
Moreover, section 11.1.2 of the code states that, when required, the shipper should ensure that CTU,
in international transport, has to be sealed with immediate action upon completion of the container
packing procedure. It has to be closed with a seal carrying a unique identification number. Some
countries may require that the number impressed on the seals meet the standard of ISO 17712.28
Section 11.3.3 of the Code of Practice for Packing of CTU clarifies that the party charged for packing
the CTU should inform the shipper of the CTU’s identification number. It can be either the container
number or vehicle number, the Verified Gross Mass (VGM) of the unit, and the seal’s identification
number, to ensure that the identification numbers and the VGM are present in all transport
documents (bill of lading, waybills, cargo manifests), which must be communicated to the carrier
within the deadlines set by the latter.29
Once the container is packed and its doors closed, a high-security seal must be applied; besides, the
seal number must be documented. In the scenario in which the shipper does not comply with this
process, some shipping companies will seal the container upon cargo receipt.30
This supply chain security is subject to and must follow security seal standards. The leading
standardised seal accreditation is ISO-7001. ISO is the International Organization for Standardization,
a standard-setting body; its body consists of representatives from various national standards
organisations.31 As mentioned previously, the ISO 17712:2013 “establishes uniform procedures for
the classification, acceptance, and withdrawal of mechanical freight container seals,” it gives detailed
information on seals that can be approved to be used in international commerce.32 Container seals
with ISO accreditation were born as a direct response to a massive security reform following the
terrorist attacks on the United States of September 2001. Its final objective was to counter-terrorism,
25 IMO/ILO/UNECE, ‘Code of Practice for Packing of Cargo Transport Units (CTU Code)’, 2014. 26 Ibid; page 35. 27 Ibid. 28 ISO, ‘ISO 17712:2013 (en) Freight Containers – Mechanical Seals’ <https://www.iso.org/obp/ui/#iso:std:iso:17712:ed- 2:v1:en> accessed August 16, 2020. 29 Ibid; ‘Code of Practice for Packing of Cargo Transport Units (CTU Code)’, page 35-36. 30 Maersk, ‘Maersk Line Container Seal Policy’, 2006. 31 ISO, ‘International Organization for Standardization’ <https://www.iso.org/about-us.html> accessed September 3, 2020. 32 Ibid; ‘ISO 17712:2013 (en) Freight Containers – Mechanical Seals’ <https://www.iso.org/obp/ui/#iso:std:iso:17712:ed- 2:v1:en> accessed August 16, 2020.
Container Seal Security | 15
illicit traffic, and smuggling of goods. ISO Norm 17712 aims at standardising the procedure to classify
the acceptance and pick-up of a container.33
Image 3: Types of Container Seals, from the left: Klicker Bolt Seal, Bolt Seal, Cable Seal.
There are different types of container seals; among the most common, there are padlock seals, wire
seals, and bolt seals; their final objective is to avoid tampering. With reference to the ISO 1772 seal
classification, there are three classified types of security seals, based on the so-called barrier capacity
or seal strength, and are as follows: “I” stands for Indicative, “S” stands for security and “H” for high
security.34 In order to remove a high-security seal (H), it is necessary to use professional lightweight
tools, such as bolt croppers of high quality and cable cutters. Their impenetrability makes it impossible
for third parties who want to open the container, to open it without clearly damaging the seal. U.S.
trade partnership against terrorism (C-TPAT) requires “H” security seals. In 2012, the European Union
and the United States of America signed a mutual agreement to recognise their respective programs
AEO and C-TPAT. More common seal shapes are nail seals and cable seals. The seals used in container
security chains differ from regular ones, known as “I” seals since they are subjected to mechanical
tests before being classified as “H” seals.
Following ISO 17712 conformity (which classifies the seal as type H), the laboratory which should
conduct the test must be certified based on ISO/IEC 17025 ( General requirements for the competence
of testing and calibration laboratories ) and shall be accredited to perform testing specific to ISO 17712
33 Ibid; Klicker Boalt Seal <https://www.megafortris.eu/product/klicker-container-bolt-seal/> consulted August 15, 2020; and High Security Container Boalt Seal, Fort Container seal <https://www.megafortris.eu/product/fort-container-seal/> consulted August 15, 2020. 34 Ibid; and Cable Seal <https://www.megafortris.eu/product/mcl-350-cable-seal/> consulted August 15, 2020.
Container Seal Security | 16
with these four tests: impact test, tensile test, bending test and cutting test.35 Two certified
laboratories are allowed to conduct mechanical tests on seals, which are: Mirdc and Dayton T. Brown.
If a seal is bought from a supplier whose certification was not issued by one of these two laboratories,
it means that the seal is not an “H” seal.
Bearing in mind that a container might have more than one seal since there are six different positions
in which seals can be placed. Usually, if only one seal is applied, it supposedly goes on the right door’
lock rods of the container since it is the first one to be opened while opening the container. Every seal
carries an identification number, which is listed in the bill of lading.
The sealed container, if necessary, has to undergo a seal inspection to verify if there are any signs of
tampering. Chapter 1.2.2 of the CTU Code highlighting the ‘Safety’ clarifies that the seal’s
identification number must match the cargo documentation. If it is not the case or shows clear signs
of tampering, several further actions are necessary.36
Chapter 12 of the CTU Code, the section of “advice
on receipt and unpacking of CTUs,” comma 12.1
states that the consignee or the receiver of a CTU
should check the unit’s condition to see if there has
been damage, a distortion, cracked or bent37.
Furthermore, comma 2 gives instructions to check
if the number on the seal matches the transport
documentation number and if the seal is damaged
or missing. If one of these scenarios occur, it would
mean that the CTU has been opened during
transport. In this case, the CTU operator “should be
contacted” and aware of the current.38
The seal is a bulwark when it comes to the security
of a container supply chain. By acquiring
information about its use and role, it gives the necessary tools and framework to further understand,
in the next chapter, how drug cartels and smugglers try to bypass container seals with the Rip-on/Rip-
off technique.
35 Ibid; and ‘ISO/IEC 17025:2017(en), ‘General requirements for the competence of testing and calibration laboratories’ <https://www.iso.org/obp/ui/#iso:std:iso-iec:17025:ed-3:v1:en:term:3.3> accessed August 16, 2020. 36 Ibid. ‘Code of Practice for Packing of Cargo Transport Units (CTU Code), 2014, page 2. 37 Ibid; page 37-38. 38 IMO et al., ‘Code of Practice for Packing of Cargo Transport Units (CTU 3Code)’, 2014.
Image 4 Container sealed with a Bolt Seal
Container Seal Security | 17
3.3. The ISPS Code
Born as a reform to the 1974 SOLAS Convention, ISPS Code came into force on July 1, 2004.39 This
Code represents a legal security framework for ports, which is the primary international response to
maritime security. It is currently used by 159 countries worldwide. However, this does not constitute
a maximum-security regime, and within critical geographical areas, such as the Indian Ocean, no port
facility adopted this set of rules.40 Since the ISPS Code was born as a response to the 9/11 attacks, it
guarantees more protection to the maritime sector. The purpose of the Code is to create a framework
aimed at evaluating risks for the Governments to make changes where needed in terms of points of
vulnerability for seaports infrastructures and to be able to adapt these security measures to different
levels of threats. These uniformed measures, established by the Code, have to be implemented with
a cooperation mechanism between all the actors involved in marine shipping: governments, port
facilities, shipping companies.
The Code is divided into two sections, respectively A and B. Part A gives minimum mandatory
requirements, addressed to ships and ports, and is “binding to contracting governments”.41
Meanwhile, while being more specific, Part B is mandatory and gives recommendations, and a set of
guidelines addressed to the security assessments and plans. Part A outlines the principles of the Code,
while part B gives specific indications on how to comply with such measures. When it comes to
compliance with security measures such as security seals, the ISPS defines three levels of safety, which
are defined as MARSEC, Maritime Security Levels:42
• MARSEC Level 1 is the basic level that port facilities and ships operate daily. It requires a seal
check and other methods to prevent tampering.
• MARSEC Level 2 is a stricter level for a window of time in which a security risk becomes visible
to security personnel.
• MARSEC Level 3 is an enhanced security measure for an imminent incident or one which has
already occurred that must be kept for a defined time frame. These measures include
preventing tampering.
However, the ISPS Code does not indicate which security seals need to be applied to containers to
avoid tampering. Moreover, it does not specify the need for certified seals. On the other hand, the
39World Shipping Council, ‘Industry Issues, Vessels and Ports’ <http://www.worldshipping.org/industry- issues/security/vessels-and-ports> accessed August 18, 2020. 40 Kenneth Christopher, ‘Port Security Management – Second Edition’, 2014, page 40. 41 Ibid; page 59. 42 United States Coast Guard, ‘U.S. Coast Guard Maritime Security (MARSEC) levels’ <https://www.uscg.mil/What-Is- MARSEC/> accessed August 17, 2020.
Customs-Trade Partnership Against Terrorism (CTPAT), another overlapping security initiative, states
that the security seals that need to be used are ISO 17712:2013.
The WCO, in June 2009, saw the willingness of the 157 member nations to implement the Standards
to Secure and Facilitate Global Trade Framework (SAFE Framework). China, Brazil, Japan, India, Chile,
and the European Union considered implementing the security framework to implement programs.
Many WCO members will need exceptional guidance and training in order to not only implement the
framework but also to fulfil its final objectives.43 Given the time-factor, the ISPS Code might now be
considered obsolete because it comprehends all the tangible aspects of seaports’ supply chain
security. An aspect that needs to be highlighted is the relevance of electronic platforms in seaports
for its supply chain to work and its security. The obsoletion of the ISPS Code and all the codes related
to it show itself because the IT world itself and, more deeply, cyberattacks are slightly considered, it
makes the global maritime industry highly unprepared for these types of attacks with a little legal
framework to work.
The future challenges seaports security will tackle more “abstract” than “tangible”; for instance, a
ship can be attacked by hackers by entering the IT system of the liner and might cause substantial
damages. Every week 17 million cyberattacks are estimated.44 Vessels do not need to be attacked
directly, as it might happen with pirates, but an attack can be directed to the IT system of the shipping
company and the Operational Technology System, quite easily. The IMO still has not formulated a
regulation against cyberattacks and guidelines on cybersecurity. This deadlock can represent a
significant open door for hackers. The ill-equipped maritime industry is extremely vulnerable.
These new-era challenges were brought to IMO by parties involved in maritime shipping; a step
towards a safer environment was made in 2014 after the organisation consulted its member about a
future maritime cybersecurity code and demanded insight on its content. In 2016, some cybersecurity
guidelines were published; the framework developed was broad in its content; it resulted in being
little practical to tackle attacks. Another step towards modernisation was made in 2017, IMO
amended the ISPS and the ISM codes, giving guidelines on how seaports and operators should
“undertake risk management processes”.45 These amendments will not enter into force until January
2021. The development of such practices and regulations are incredibly fundamental to protect the
43 USAID, ‘Customs Modernization Handbook, Authorized Economic Operators Program’ <https://www.tfafacility.org/sites/default/files/case-studies/usaid_aeo_programs_handbook.pdf> 2010, accessed August 18, 2020. 44 Vivian Louis Forbes, ‘The Global Maritime Industry Remains Unprepared for Future Cybersecurity Challenges’, 2018, page 3. 45 Ibid; page 4.
Container Seal Security | 19
maritime security supply chain, even if they are cost-related, expensive, and a significant reform for
the seaport system, which is in many cases.46
For instance, a cyberattack occurred in 2017 against Maersk shipping company. It suffered a
ransomware attack called “Petya.” The attack involved the company’s container shipping. The oil
tanker and tugboat were affected and crippled by computer outages. It resulted in a profit loss of
300million USD. It can be considered a financial disaster; some experts argued that this could have
been avoidable using a blockchain system.47 Shipping companies are becoming more concerned about
the tools to fight cyberattacks. For this reason, some of them are developing a new system to face
this issue with blockchain technology.
3.4. Container Tracking
Container tracking has become a more widely used component in the provision of container security,
mostly due to the uncertainty of the shipping process. Tracking a container’s exact location cannot be
solved by just using a Global Positioning System (GPS) because there are four different logistic actors
involved in a shipping “transaction” who do not have an existing cooperative tracking system.
The four different parties are defined as follows: First-party (1PL) It is a company that has produced
goods and needs to export them via maritime shipping. There is the possibility that the 1PL might also
be the goods’ receiver. It is relevant for this party to track a container because the delay or
“disruption” of the container might provoke a problem to “their supply chain.”
The 1PL does not own the vessel nor the container. Otherwise, tracking would be facilitated; the liner
owns both the vessel and containers. This scenario opens for a multi-tenancy issue for tracking. For
instance, the goods are from the 1PL. However, a company or multiple own the ship, container, and
truck. It is challenging for the 1PL to determine where to put a tracking device.48
The Second Party (2PL) “is a shipper or hauler,” for instance, Maersk, Hapag-Lloyd, MSC. These
shippers are the most active in tracking containers because they are liable if they do not fulfil the
“contract” and deliver the container to the right destination. The liner owns the ships. However, not
all of them own the containers placed in their cargo. In this scenario, 2PL would need to pay extra
attention to manage the moment when the device is placed and eventually removed from the
46 Ibid; page 5. 47 IMO, ‘Current Awareness Bulletin’. <http://www.imo.org/en/KnowledgeCentre/CurrentAwarenessBulletin/Documents/CAB%20248%20July%202017.pdf> 2017, accessed 19 August 2020; and Martyn Wingrove, ‘Blockchain would have prevented Maersk cyber- attack’ <https://www.rivieramm.com/news-content-hub/blockchain-would-have-prevented-maersk-cyber-attack-28063> 2017, accessed August 19, 2020. 48 Link Labs, ‘Container Tracking Systems: Everything you need to know’, 2018 <https://www.link-labs.com/blog/container- tracking> accessed August 17, 2020.
Container Seal Security | 20
container; given the vast number of containers present on board a vessel, it would be very time-
consuming to do so.49 Another aspect to take into consideration is that the 2PL does not hold much
interest in doing so. Putting a tracking device is usually not included in the shipping contract unless it
is the case of precious cargo. If it is the latter, 2PL will make an exception for tracking the container.
The Third Party (3PL) is a logistic provider, has the task to coordinate and schedule the shipping of
goods for the 1PL “by using 2PL shippers”.50 The Fourth Party, 4PL, is an “independent body” that aids
the 1PL “organise their supply chain across multiple third-party logistic providers. Given Faraday’s law,
it is almost useless to insert a GPS inside a container because since they are large metal boxes, they
act as cages, so the wireless signal cannot get out of the metal box; the main reason why the 1PL
should attach the GPS on the container’s lock, so generally at the exterior.
Currently, on the market, the previously mentioned party can buy a tracking device; two of the most
commons, concerning GPS based, are the locking mechanisms and the magnetic devices.51 The locking
mechanisms which has the goal to seal the container; they include a tracking device, and since they
are placed within the sealing action, the 1PL is adding them. Another standard option is magnetic
devices, which are positioned on the side of the container. They will not be placed on top of containers
since shipping containers are stacked on top, so they are placed on a shipping container’s structural
rib. The device works with the accelerometer technique; in other words, it means that as soon as its
sensor feels the ship moving, it turns on, “gets a GPS fix” via satellite or cellular.52 Once the signal
reaches the cellular constellation, the data transmitted, location, is sent and backend in the
application provider’s system and then “given” to the customer, in this case, 1PL.
There are both positive and negative aspects of container tracking. GPS container tracking systems
are very meticulous, self-contained, and readily available.53 Given the accuracy of such a system, there
is no need for extra infrastructure to apply them on container shipping and the availability on the
market (ORBCOMM)60, in which there are companies who make GPS exclusively for logistics.
However, GPS tracking also bears some difficulties. Given the economic aspect, they are not cheap. It
ranges for both GSM and GPS between $7 and $30 per month.54
Environmental conditions are part of the tracking’s precision; for instance, there must be a clear view
of the sky. As mentioned previously, shipping containers are stacked one on one, and if this is the
case, it is almost impossible for the GPS to send a signal. The customer is only going to get a signal
49 Ibid. 50 Ibid. 51 Ibid. 52 Ibid. 53 Ibid. 54 Ibid.
Container Seal Security | 21
once the container is placed somewhere else. Also, the GPS itself consumes a lot of battery, which
usually needs to be replaced after six months, which means that the GPS cannot always be on since it
would consume all the battery in just a few days.55
The GPS has to download from its satellite an ephemeris constellation data; thus, it will show its
location. Nevertheless, to do so, it takes up to five minutes. Another way to track the shipping
container is shorter-range wireless container tracking. This system does not work as GPS does; it does
not send its data to a satellite or cellular. The system is malleable to a company’s needs. (IoT) Internet
of things.56 Considering the economic aspect, compared to the less expensive GPS is around 7$ per
container, this system costs per container $1 per month. Not only considering the “long investment”
of the hardware product, a GPS application usually costs around $50-$300; meanwhile, for the shorter
range is around $10.57
On the other hand, the battery of a GPS is power-hungry, so it will eventually die in a few months; the
shorter-range wireless container tracking lasts much more. Since it is using Bluetooth technology, the
battery could last up to three years or more. The difference standing between these two systems is
that a GPS has to send the data to a satellite or cellular, turning it on and off and uploading a system.
Meanwhile, the shorter-range using Bluetooth technology needs to transmit the signal to a “nearby.58
When it comes to this method’s difficulties, bears are that it requires a much bigger infrastructure
than GPS. The latter is “self-contained”; meanwhile, the shorter-range needs communication from
the “tracking module to another part of the system.” When it comes to moving a larger quantity of
containers, this system can be worked out because some Bluetooth transmitter could be put just on
some containers, “and then select a subset of those trackers to have their data backhauled via
cellular”; with this method, the containers are being tracked, and fewer infrastructures are used.59
The difficulty also comes in the sense that it will need to backhaul the location data and “communicate
that information” with the shorter range. However, if it considers the cost-benefit combination, it will
be worth it at a certain scale point since it will offer lots of benefits compared to its costs. Given the
complex scenario that shipping companies need to face when tracking a CTU, Maersk, and IBM
55 Ibid. 56 Port Technology, ‘IoT standards for container connectivity launched’ <https://www.porttechnology.org/news/iot-
standards-for-container-connectivity-launched/> accessed August 17, 2020. 57 Ibid. and ‘Container Tracking Systems: Everything you need to know’ <https://www.link-labs.com/blog/container-
tracking> accessed August 17, 2020. 58 Ibid. 59 Ibid.
Container Seal Security | 22
cooperated to create a Blockchain-based container tracking service, TradeLens. More than 20 port
terminals have signed up for this program, including Port of Rotterdam (PoR) and PSA Singapore.60
4. Challenges head for seaports
4.1. Corruption at seaports
As mentioned previously, to tackle modus operandi such as the Rip-On/Rip-Off technique,
policymakers, port authorities, and international maritime organisation should merge their will in
order to create a legal framework when it comes to corruption at seaports, as well as implementing
their security when it comes to being vulnerable towards cyberattacks and traceability. Given these
premises in this chapter, it follows some policy recommendations that might be useful.
In the Rip-On/Rip-Off technique, a key factor for the operation’s success are accomplices among
seaports workers at the port of arrival and destination. Without them, OCGs would not obtain internal
information, which is extremely useful for the outcome. To avoid or limit corrupted workers that could
mine to the security of the seaport itself, the process to maintain a high level of security should start
from the very beginning, at a job application stage. As outlined previously, various reasons contribute
to port workers’ corruption (history of gambling, financial issues, etc.). For this cause, when a
candidate applies for a position inside the port, a background check should be conducted. Moreover,
what should be dug deeper into is the financial status, history of drug abuse, gambling, and any other
criminal records.61 Furthermore, another security step to be conducted should be the screening of
personnel who held key positions in handling containers. The reason behind the screening is their
know-how, which is highly valuable to OCGs, to handle the container during the Rip-On. The screening
of such personnel should be done by consulting logistic companies responsible for registering these
employees and checking if any of them has registered any violations of occupational integrity.62
Employees who cover key position port authorities should reconsider who should have information
and who should have access to it, a sort of balance of powers but with information, in a way in which
information is compartmentalised, as a human blockchain, on a need-to-know basis.63 Lastly, port
authorities should implement and stimulate values such as integrity by delivering workshops for their
employees with a security official and experts to explain the legal and penal outcomes of taking part
60 IBM, ‘Blockchain Industry Supply Chain’ <https://www.ibm.com/blockchain/industries/supply-chain> accessed August 20, 2020. 61 Yarin Eski, Romano Bujit, ‘Dockers in Drugs: Policing the Illegal Drug Trade and Port Employee Corruption in the Port of Rotterdam’ 2019, page 383. 62 Ibid. 63 Ibid.
Container Seal Security | 23
in a Rip-On/Rip-off and its consequences. More in general, port authorities should enforce stricter
access to their facility, such as surveillance tools, to prevent external parties which have an illegal
business to have access to the docks and containers moreover to cooperate with policing authorities
to share information on port employees which might be vulnerable subjects or at risk.
4.2. Blockchain Solutions
Blockchain has seen previously, will solve many issues that currently port facilities and more, in
general, the international maritime traffic is facing, such as avoiding cyberattack, tracking containers
and deeper the automatisation of ports. The global trade since 1956 uses a paper-based method for
container shipping; everything that concerns the status of the containers and the cargo inside. This
paper-based system makes the supply chain slower and too complicated given all the actors involved
in the supply chain; for this reason, maritime security is put at stake by this obsolete method and gives
a broad space for OCGs to carry out their illegal practice. The illusion of controls by organised crime
is something that can be solved with blockchain. The automatisation of port thru blockchains would
make for OCGs almost impossible techniques such as the Rip-on/Rip-Off.
Blockchain technology is a digital transaction ledger stored and maintained on multiple systems
belonging to multiple entities sharing identical information; it creates a web that shares the
responsibility of storing, maintaining, and, more importantly, validating the information present in
the blockchain. The so-called authorised participants can review entries, and users can update
information stored on the blockchain only if the network consensus algorithm validates it. Information
stored in a blockchain can never be deleted and serves as a verifiable and accurate record of every
transaction made within the ledger.64
Blockchain technology helps to make faster transactions, which are processed with few intermediaries
with a peer-to-peer approach. Moreover, ledgers are updated automatically, and the transaction is
executed, on both sides, at the same moment; it gives the blockchain a “fast transaction
settlement”.65 Another benefit for its users is the meagre cost, mainly because of the limited number
of intermediaries, there is no “reconciliation work” required, and these transactions are validated by
computing power and not a more expensive workforce.
The fundamental characteristic of this technology is its transparency. All the chronologies are stored
in the ledgers; thus, there is a record of every transaction made. It is also an open-source technology,
64 IBM, ‘IBM and Maersk demo: Cross-border supply chain solution on blockchain’
<https://www.youtube.com/watch?v=tdhpYQCWnCw> accessed September 5, 2020. 65 Deloitte and Tax Consulting, ‘Continuous Interconnected Supply Chain Using Blockchain & Internet-of-Things in supply chain traceability’, 2017.
Container Seal Security | 24
and all the transactions are visible to the authorised parties; furthermore, all accounts are identifiable.
What makes blockchain technology a bulwark for the maritime supply chain is its reliability, which
means that it does not have any single point of failure; the transactions made are irrevocable and
immutable and registered in ledgers. The importance of blockchain technology in maritime shipping
is broad. One of its most valuable points is that it reduces intermediaries, which translates into an
increase in efficiency and reduction of costs.66
Taking a closer look at Blockchain technology’s role in the maritime shipping supply chain and its
benefits and risks that companies revolving around the maritime supply chain might have, it can be
seen how without blockchain technology, there is a risk of a ripple effect. The cause behind this is an
extended value chain. Companies face several risks with extensive supply chains since several actors
are playing a role inside the chain (stakeholders, suppliers, distributors, customers).67
As a domino effect having an extensive supply chain might be ineffective in managing risks, making it
difficult to predict and foresee risks to have a prompt and direct response. Another challenge that
companies face with the obsoletion of the supply chain is the impossibility to see end-to-end. To track
down and to have a 360-degree overview of the supply chain is extremely hard. Moreover, it is more
comfortable to be exposed to risks such as tampering of containers, fraud, violation of conduct, and
many more.68
The challenges facing today’s supply chain are the amount of communication paperwork and the
complex web of interactions between parties involved in this transaction, such as transportation
providers, shipping industries, freight forwarders, customs, port authorities, and more. Born from the
IBM and Maersk shipping company’s idea, a new platform has been created designed to exchange
event data and handle document workflows. What these two companies are doing is to apply
blockchain technology in order to create a global tamper-proof system for digitising trade workflow
and tracking shipments end-to-end. By doing so, the final objective is to eliminate frictions, among
them point-to-point.69
This is a step forward for addressing the issues involved in tracking containers, which is with GPS
technology system extremely expensive and applied just too few containers. On the other hand, with
blockchain technology, there will be the potential ability to track down millions of containers each
year at a smaller cost.
66 Ibid. 67 Ibid. 68 Ibid. 69 Ibid; and IBM, ‘IBM and Maersk demo: Cross-border supply chain solution on blockchain’.
Container Seal Security | 25
A recent example of how this technology works were carried out by the two companies to shipping
flowers, a perishable good, from Kenya to Rotterdam in a container. With the current paper-based
communication method, around 200 communications were issued; this leaves space for eventual
issues with data accuracy presents on communications and data interpterion resulting in a higher
increase of issues such as tampering. In simpler words, the communication process involved in
shipping a container is intricated. Here follows, there will be an outline of how this process works
using blockchain technology.
Image 5: An overview of the shipping process and its paper-based communication system.70
When the container leaves the port of origin, in this case, Mombasa, it requires the signature of three
different agencies (KRA, KEPHIS, HCDA) moreover six more documents, which are packing list,
commercial invoice, certificate of origins, phytosanitary certification, export license and bill of lading.
This process is done in order for the export to be approved.71
The Kenyan farm submits a packing list that becomes visible to all the parties involved; this action
starts a contract, which enforces an export approval workflow between the three agencies mentioned
previously (KRA, KEPHIS, HCDA). Each agency has to sign the status, which is updated to everyone to
simultaneously see information about the inspection of the flowers, the status of the container, and
the trucker’s pickup. The approval from customs is communicated to Mombasa’s port, allowing them
to prepare for the container. All actions relating to the documents and goods are captured and shared.
Blockchain delivers a clear overview of all documents submitted when and by whom, where the
70 Ibid; ‘IBM and Maersk demo: Cross-border supply chain solution on blockchain’. 71 Ibid.
Container Seal Security | 26
flowers are, who owns them, and the next steps in their journey. Flowers are perishable, so there
must be no delays or missed steps.
Blockchain provides secure data exchange
and a tamper-proof repository for these
documents and shipping events. This system
could significantly reduce delays and fraud,
saving billions of dollars annually and,
according to the WTO, reducing barriers
within the international supply chain. It could
increase worldwide GDP by almost 5% and
total trade volume by 15%.
72
5. Conclusion
As outlined in this research, OCGs use the Rip-On and Rip-Off technique to introduce illegal goods
inside a legit cargo; by doing so, they tamper with the container seals. This technique has a high
percentage of success due to the few controls in place for container screening worldwide, at around
0.0005% of the total container volume. For this reason, it is tough for police enforcement to spot and
find containers that have been used to fulfil such modus operandi.
Moreover, container seals tampering becomes facilitated when the number of containers is almost
overwhelming in ports because it is hard for port authorities and police enforcement to spot which
containers have been tampered with. Container seals show signs of tampering when they are broken
or replaced with a different serial number.
Such practices give authorities a much broader area in which they need to look at by doing a risk
assessment on a small number of containers; furthermore, it has been seen how introducing
blockchain technology could solve some problems involving container security. It would be easier for
law enforcement to collect all the data needed for risk assessment, having a beginning-to-end
72 Ibid; ‘IBM and Maersk demo: Cross-border supply chain solution on blockchain’.
Shipper Records
Bank Records
Auditor Records
Image 6: An overview of the shipping process’ communication system using blockchain technology.
Container Seal Security | 27
traceability of the container and its routes, to tackle frauds and improve Customs compliances and
trade facilitation.73 Currently, IMO, UNODC, and WCO monitor how this tool can ensure a global safer
supply chain crime proof.
The fundamental role blockchain will have in the near future is to improve security in seaports
worldwide, concerning techniques such as the Rip-on and Rip-Off and cyberattacks, a new challenge
maritime security has to face. It will also speed the process of ports automatisation, in order to make
not only the maritime supply chain more efficient in terms of speed, economic costs, and time but
also to avoid any container tampering during the whole process by giving to every party involved in
the supply chain all the information regarding the status of the container. Blockchain technology
shows itself to be one of the keys to container security and maritime security in general, asking for
the maritime community to speed the IT process for long-term results and to safer seaports. It will be
the conditio sine qua non to the enforcement of port security.
73 United Nations Office on Drugs and Crime, ‘Container Control Program, 2019 report’ page 20.
Container Seal Security | 28
6. Bibliography
6.1. Literature
Girish Gujar, Adolf K.Y. Ng, Zaili Yang ‘Contemporary Container Security’, 2018.
H.J.M. Staring, L.C.J. Bisschop, R.A. Roks, E.G. Brein and H.G. van de Bunt, ‘Drug Crime in the Port of
Rotterdam: about the phenomenon and its approach’, 2019.
Ajatshartu Bhattacharya and Benjamin Peters, ‘The Underwater War on Drugs: An overview of the
Dutch Customs Diving Team’, 2020, Invictus Corporation Ltd., August 2020.
Kenneth Christopher, ‘Port Security Management – Second Edition’, 2014.
Vivian Louis Forbes, ‘The Global Maritime Industry Remains Unprepared for Future Cybersecurity
Challenges’, 2018.
Yarin Eski, Romano Buijt, ‘Dockers in Drugs: Policing the Illegal Drug Trade and Port Employee
Corruption in the Port of Rotterdam’, article consulted November 5, 2020.
6.2. Reports
of-Things in supply chain traceability’, 2017.
European Monitoring Centre for Drugs and Drug Addiction, ‘Perspectives on Drugs, Cocaine
Trafficking to Europe’, Updated 31.5.2016.
EUROPOL, ‘EU Drug Markets Report – a Strategic Analysis’, 2019.
Eurostat, ‘Gross weight of seaborne freight handled in all ports’, 2018
<https://ec.europa.eu/eurostat/statistics-
explained/index.php?title=File:Gross_weight_of_seaborne_freight_handled_in_all_ports,_2018_(to
Frank Boerman Martin Grapendaal Fred Nieuwenhuis Ewout Stoffers, ‘National Threat Assessment:
Organized Crime’, 2017.
Maersk, ‘Maersk Line Container Seal Policy’, Report 2006.
United Nations Conference on Trade and Development, ‘Review on Maritime Transport 2018’, 2018.
United Nations Office on Drugs and Crime, ‘Container Control Program, 2019 report’ 2019.
<http://www.imo.org/en/MediaCentre/HotTopics/container/Pages/default.aspx> accessed August
15, 2020.
IMO/ILO/UNECE, ‘Code of Practice for Packing of Cargo Transport Units (CTU Code)’, 2014.
ISO, ‘ISO 17712:2013 (en) Freight Containers – Mechanical Seals’.
<https://www.iso.org/obp/ui/#iso:std:iso:17712:ed-2:v1:en> accessed August 16, 2020.
ISO/IEC 17025:2017(en), ‘General requirements for the competence of testing and calibration
laboratories’, <https://www.iso.org/obp/ui/#iso:std:iso-iec:17025:ed-3:v1:en:term:3.3> accessed
August 16, 2020.
United States Coast Guard, ‘U.S. Coast Guard Maritime Security (MARSEC) levels’,
<https://www.uscg.mil/What-Is-MARSEC/> accessed August 17, 2020.
USAID, ‘Customs Modernization Handbook, Authorised Economic Operators Program’,
<https://www.tfafacility.org/sites/default/files/case- studies/usaid_aeo_programs_handbook.pdf>
World Shipping Council, ‘Industry Issues, Vessels and Ports’
<http://www.worldshipping.org/industry-issues/security/vessels-and-ports> accessed August 18,
Cable Seal, <https://www.megafortris.eu/product/mcl-350-cable-seal/> consulted August 15, 2020.
European Monitoring Center for Drugs and Drug Addiction, ‘Interactive map of cocaine trafficking
routes to Europe’ <https://www.emcdda.europa.eu/cocaine-trafficking-europe_en> accessed
container-seal/>consulted August 15, 2020.
<https://www.rivieramm.com/news-content-hub/blockchain-would-have-prevented-maersk-cyber-
IBM, ‘Blockchain industry supply chain’ <https://www.ibm.com/blockchain/industries/supply-
chain>, accessed August 20, 2020.
IBM, ‘IBM and Maersk demo: Cross-border supply chain solution on blockchain’
<https://www.youtube.com/watch?v=tdhpYQCWnCw> accessed September 5, 2020.
accessed September 3, 2020.
Link Labs, ‘Container Tracking Systems: Everything you need to know’, <https://www.link-
labs.com/blog/container-tracking> accessed August 17, 2020.
Martyn Wingrove, ‘Blockchain would have prevented Maersk cyber-attack’
Port Technology, ‘IoT standards for container connectivity launched’
<https://www.porttechnology.org/news/iot-standards-for-container-connectivity-launched/>
accessed August 17, 2020.
United Nations Office On Drugs and Crime, ‘CCP Glossary of Terms’
<https://www.unodc.org/ropan/en/BorderControl/container-control/ccp-glossary-of-terms.html>
accessed August 25, 2020.
6.5. List of Figures
Graph 1: All Cargo (Crude Oil, petroleum products, and gas; main bulks; other dry cargo)
United Nations Conference on Trade and Development, based on data supplied by reporting countries
and as published on government and port industry websites, and by specialist sources. Notes: Dry
cargo data for 2006 onwards were revised and updated to reflect improved reporting, including more
recent figures and a better breakdown by cargo type. Since 2006, the breakdown of dry cargo into
main bulks and dry cargo other than main bulks is based on various issues of the Shipping Review and
Outlook, produced by Clarksons Research. Total estimates of seaborne trade figures for 2017 are
based on preliminary data or the last year for which data were available.
Graph 2: Gross weight (tonnes per inhabitant) of seaborne freight handled in all seaports (2018)
Eurostat, ‘Gross weight of seaborne freight handled in all ports’, 2018, accessed September 1, 2020.
Image 1: Cocaine trafficking routes to the EU
European Monitoring Center for Drugs and Drug Addiction, ‘Interactive map of cocaine trafficking
routes to Europe’ <https://www.emcdda.europa.eu/cocaine-trafficking-europe_en> accessed
Image 2: An overview of the Rip-On/Rip-Off modus operandi
H.J.M. Staring, L.C.J. Bisschop, R.A. Roks, E.G. Brein and H.G. van de Bunt, ‘Drug Crime in the Port of
Rotterdam: about the phenomenon and its approach’, 2019 page 23.
Graph 3: Corruption and fraud investigations at Port of Rotterdam
Yarin Eski, Romano Buijt, ‘Dockers in Drugs: Policing the Illegal Drug Trade and Port Employee
Corruption in the Port of Rotterdam’, 2019, page 374-375.
Image 3: Types of Container Seals, from the left: Klicker Bolt Seal, Bolt Seal, Cable Seal
Klicker Boalt Seal <https://www.megafortris.eu/product/klicker-container-bolt-seal/> consulted
August 15, 2020; and High Security Container Boalt Seal, Fort Container seal
<https://www.megafortris.eu/product/fort-container-seal/> consulted August 15, 2020. Cable Seal
<https://www.megafortris.eu/product/mcl-350-cable-seal/> consulted August 15, 2020.
Image 4: Container sealed with a Bolt Seal
IMO/ILO/UNECE, ‘Code of Practice for Packing of Cargo Transport Units (CTU 3Code)’, 2014.
Image 5: An overview of the shipping process and its paper-based communication method
IBM, ‘IBM and Maersk demo: Cross-border supply chain solution on blockchain’
<https://www.youtube.com/watch?v=tdhpYQCWnCw> accessed September 5, 2020.
Image 6: An Overview of the shipping process’ communication system using blockchain technology
IBM, ‘IBM and Maersk demo: Cross-border supply chain solution on blockchain’
<https://www.youtube.com/watch?v=tdhpYQCWnCw> accessed September 5, 2020.

Recommended